First published: Mon Jan 31 2011(Updated: )
Multiple stack-based buffer overflows in Intel Alert Management System (aka AMS or AMS2), as used in Symantec AntiVirus Corporate Edition (SAVCE) 10.x before 10.1 MR10, Symantec System Center (SSC) 10.x, and Symantec Quarantine Server 3.5 and 3.6, allow remote attackers to execute arbitrary code via (1) a long string to msgsys.exe, related to the AMSSendAlertAct function in AMSLIB.dll in the Intel Alert Handler service (aka Symantec Intel Handler service); a long (2) modem string or (3) PIN number to msgsys.exe, related to pagehndl.dll in the Intel Alert Handler service; or (4) a message to msgsys.exe, related to iao.exe in the Intel Alert Originator service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Antivirus | =10.1.6.1 | |
Symantec Antivirus | =10.0.7 | |
Symantec Antivirus | =10.2-mr3 | |
Symantec Antivirus | =10.2 | |
Symantec Antivirus | =10.1-mr6 | |
Symantec Antivirus | =10.2-mr2 | |
Symantec Antivirus | =10.1.6 | |
Symantec Antivirus | =10.0.6 | |
Symantec Antivirus | =10.0-mr2 | |
Symantec Antivirus | =10.1-mr4 | |
Symantec Antivirus | =10.1.5 | |
Symantec Antivirus | =10.1 | |
Symantec Antivirus | =10.1.4.1 | |
Symantec Antivirus | =10.0.2 | |
Symantec Antivirus | =10.1-mr7 | |
Symantec Antivirus | =10.0.1 | |
Symantec Antivirus | =10.0.9 | |
Symantec Antivirus | =10.1.7 | |
Symantec Antivirus | =10.1.8 | |
Symantec Antivirus | =10.0 | |
Symantec Antivirus | =10.0.5 | |
Symantec Antivirus | =10.0.4 | |
Symantec Antivirus | =10.1.0.1 | |
Symantec Antivirus | =10.0.8 | |
Symantec Antivirus | =10.1.9 | |
Symantec Antivirus | =10.0.1.2 | |
Symantec Antivirus | =10.0.2.2 | |
Symantec Antivirus | =10.0-mr1 | |
Symantec Antivirus | =10.0.3 | |
Symantec Antivirus | =10.1-mp1 | |
Symantec Antivirus | =10.1.5.1 | |
Symantec Antivirus | =10.1.4 | |
Symantec Antivirus | =10.0.1.1 | |
Symantec Antivirus | =10.0.2.1 | |
Symantec Antivirus | =10.1-mr5 | |
Symantec System Center | =10.0 | |
Symantec System Center | =10.1 | |
Symantec AntiVirus Central Quarantine Server | =3.6 | |
Symantec AntiVirus Central Quarantine Server | =3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0110 has been classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2010-0110, users should upgrade to a patched version of Symantec AntiVirus or relevant software that addresses this vulnerability.
CVE-2010-0110 affects multiple versions of Symantec AntiVirus Corporate Edition, Symantec System Center, and Symantec Quarantine Server.
Yes, CVE-2010-0110 can be exploited remotely, allowing attackers to execute arbitrary code on vulnerable systems.
The potential impacts of CVE-2010-0110 include unauthorized access to systems, data theft, and the ability to deploy malware.